Network Attacks Flashcards
Network Attacks
o Denial of Service o Spoofing o Hijacking o Replay o Transitive Attacks o DNS attacks o ARP Poisoning
Port
A logical communication endpoint that exists on a computer or server
Inbound Port
A logical communication opening on a server that is listening for a connection from a client
Outbound Port
A logical communication opening created on a client in order to call out to a server that is listening for a connection
Ports can be any number between
0 and 65,535
Well-Known Ports
Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)
Registered Ports
Ports 1024 to 49,151 are considered registered and are usually assigned to proprietary protocols
Dynamic or Private Ports
Ports 49,152 to 65,535 can be used by any application without being registered with IANA
Denial of Service
Attacks which attempt to make a computer or server’s resources unavailable
- Flood Attacks
- Ping of Death
- Teardrop Attack
- Permanent DoS
- Fork Bomb
Flood Attack
A specialized type of DoS which attempts to send more packets to a single server or host than they can handle
Ping Flood
An attacker attempts to flood the server by sending too many ICMP echo request packets (which are known as pings)
Smurf Attack
Attacker sends a ping to subnet broadcast address and devices reply to spoofed IP (victim server), using up bandwidth and processing
Fraggle Attack
Attacker sends a UDP echo packet to port 7 (ECHO) and port 19 (CHARGEN) to flood a server with UDP packets
SYN Flood
Variant on a Denial of Service (DOS) attack where attacker initiates multiple TCP sessions but never completes the 3-way handshake
Flood guards, time outs, and an IPS can prevent SYN Floods
XMAS Attack
A specialized network scan that sets the FIN, PSH, and URG flags set and can cause a device to crash or reboot
Ping of Death
An attack that sends an oversized and malformed packet to another computer or server
Teardrop Attack
Attack that breaks apart packets into IP fragments, modifies them with overlapping and oversized payloads, and sends them to a victim machine
Permanent Denial of Service
Attack which exploits a security flaw to permanently break a networking device by reflashing its firmware
Fork Bomb
Attack that creates a large number of processes to use up the available processing power of a computer
Distributed Denial of Service (DDoS)
A group of compromised systems attack simultaneously a single target to create a Denial of Service (DOS)
DNS Amplification
Attack which relies on the large amount of DNS information that is sent in response to a spoofed query on behalf of the victimized server
Blackholing or Sinkholing
Stopping a DDoS
Identifies any attacking IP addresses and routes all their traffic to a nonexistent server through the null interface
Spoofing
§ Occurs when an attacker masquerades as another person by falsifying their identity
§ Anything that uniquely identifies a user or system can be spoofed
§ Proper authentication is used to detect and prevent spoofing
Hijacking
§ Exploitation of a computer session in an attempt to gain unauthorized access to data, services, or other resources on a computer or server